Proceedings of the 6th ACM workshop on Formal methods in security engineering

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Shmatikov, Vitaly (VerfasserIn)
Körperschaft: CCS08: 15th ACM Conference on Computer and Communications Security 2008 (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: New York,NY,United States Association for Computing Machinery 2008
Schriftenreihe:ACM Conferences
Online-Zugang:DE-19
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 c 4500
001 BV048952114
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 230510m2008 xx o|||| 00||| eng d
020 |a 9781605582887  |9 978-1-60558-288-7 
035 |a (ZDB-15-ACM)10.1145/1456396 
035 |a (OCoLC)1379397744 
035 |a (DE-599)BVBBV048952114 
040 |a DE-604  |b ger 
041 0 |a eng 
049 |a DE-19 
100 1 |a Shmatikov, Vitaly  |e Verfasser  |4 aut 
245 1 0 |a Proceedings of the 6th ACM workshop on Formal methods in security engineering 
246 1 0 |a FMSE '08 
264 1 |a New York,NY,United States  |b Association for Computing Machinery  |c 2008 
300 |a 1 Online-Ressource (70 Seiten) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 0 |a ACM Conferences 
710 2 |a CCS08: 15th ACM Conference on Computer and Communications Security 2008  |d 2008  |c Alexandria Virginia USA  |e Verfasser  |4 aut 
710 2 |a Association for Computing Machinery-Digital Library  |e Sonstige  |4 oth 
710 2 |a ACM Special Interest Group on Security, Audit and Control  |e Sonstige  |4 oth 
710 2 |a ACM SIGs  |e Sonstige  |4 oth 
856 4 0 |u https://dl.acm.org/action/showBook?doi=10.1145%2F1456396  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-15-ACM 
943 1 |a oai:aleph.bib-bvb.de:BVB01-034215962 
966 e |u https://dl.acm.org/action/showBook?doi=10.1145%2F1456396  |l DE-19  |p ZDB-15-ACM  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-UBM_katkey 6345932
DE-BY-UBM_local_url Verlag
https://dl.acm.org/action/showBook?doi=10.1145%2F1456396
_version_ 1823049007835906048
any_adam_object
author Shmatikov, Vitaly
author_corporate CCS08: 15th ACM Conference on Computer and Communications Security 2008
author_corporate_role aut
author_facet Shmatikov, Vitaly
CCS08: 15th ACM Conference on Computer and Communications Security 2008
author_role aut
author_sort Shmatikov, Vitaly
author_variant v s vs
building Verbundindex
bvnumber BV048952114
collection ZDB-15-ACM
ctrlnum (ZDB-15-ACM)10.1145/1456396
(OCoLC)1379397744
(DE-599)BVBBV048952114
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01497nam a2200373 c 4500</leader><controlfield tag="001">BV048952114</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230510m2008 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781605582887</subfield><subfield code="9">978-1-60558-288-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-15-ACM)10.1145/1456396</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1379397744</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048952114</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-19</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shmatikov, Vitaly</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Proceedings of the 6th ACM workshop on Formal methods in security engineering</subfield></datafield><datafield tag="246" ind1="1" ind2="0"><subfield code="a">FMSE '08</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York,NY,United States</subfield><subfield code="b">Association for Computing Machinery</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (70 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">ACM Conferences</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">CCS08: 15th ACM Conference on Computer and Communications Security 2008</subfield><subfield code="d">2008</subfield><subfield code="c">Alexandria Virginia USA</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Association for Computing Machinery-Digital Library</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ACM Special Interest Group on Security, Audit and Control</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ACM SIGs</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://dl.acm.org/action/showBook?doi=10.1145%2F1456396</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-15-ACM</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034215962</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://dl.acm.org/action/showBook?doi=10.1145%2F1456396</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-15-ACM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV048952114
illustrated Not Illustrated
indexdate 2025-02-03T15:58:23Z
institution BVB
isbn 9781605582887
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-034215962
oclc_num 1379397744
open_access_boolean
owner DE-19
DE-BY-UBM
owner_facet DE-19
DE-BY-UBM
physical 1 Online-Ressource (70 Seiten)
psigel ZDB-15-ACM
publishDate 2008
publishDateSearch 2008
publishDateSort 2008
publisher Association for Computing Machinery
record_format marc
series2 ACM Conferences
spellingShingle Shmatikov, Vitaly
Proceedings of the 6th ACM workshop on Formal methods in security engineering
title Proceedings of the 6th ACM workshop on Formal methods in security engineering
title_alt FMSE '08
title_auth Proceedings of the 6th ACM workshop on Formal methods in security engineering
title_exact_search Proceedings of the 6th ACM workshop on Formal methods in security engineering
title_full Proceedings of the 6th ACM workshop on Formal methods in security engineering
title_fullStr Proceedings of the 6th ACM workshop on Formal methods in security engineering
title_full_unstemmed Proceedings of the 6th ACM workshop on Formal methods in security engineering
title_short Proceedings of the 6th ACM workshop on Formal methods in security engineering
title_sort proceedings of the 6th acm workshop on formal methods in security engineering
url https://dl.acm.org/action/showBook?doi=10.1145%2F1456396
work_keys_str_mv AT shmatikovvitaly proceedingsofthe6thacmworkshoponformalmethodsinsecurityengineering
AT ccs0815thacmconferenceoncomputerandcommunicationssecurity2008 proceedingsofthe6thacmworkshoponformalmethodsinsecurityengineering
AT associationforcomputingmachinerydigitallibrary proceedingsofthe6thacmworkshoponformalmethodsinsecurityengineering
AT acmspecialinterestgrouponsecurityauditandcontrol proceedingsofthe6thacmworkshoponformalmethodsinsecurityengineering
AT acmsigs proceedingsofthe6thacmworkshoponformalmethodsinsecurityengineering
AT shmatikovvitaly fmse08
AT ccs0815thacmconferenceoncomputerandcommunicationssecurity2008 fmse08
AT associationforcomputingmachinerydigitallibrary fmse08
AT acmspecialinterestgrouponsecurityauditandcontrol fmse08
AT acmsigs fmse08